Dec. 12, 2023, 4:20 p.m. | Jeffrey Burt

Security Boulevard securityboulevard.com


The notorious North Korea-backed Lazarus Group continues to change up its tactics to evade detection, with a new campaign featuring the exploitation of the Log4j critical vulnerability and three new malware families written in the D – or DLang – programming language. The campaign is being run by the advanced persistent threat (APT) group Andariel..


The post Lazarus Group Exploits Log4j Flaw in New Malware Campaign appeared first on Security Boulevard.

advanced andariel campaign change cisco talos critical critical vulnerability cybersecurity data security detection dlang endpoint evade exploitation exploits families featured flaw korea language lazarus lazarus group log4j malware malware campaign network security north north korea persistent programming programming language run security boulevard (original) social - facebook social - linkedin social - x spotlight tactics threat intelligence vulnerabilities vulnerability written

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom